Unsolicited bulk e-mail is referred to as __________.

A. spam
B. propagating
C. phishing
D. crimeware

A. spam

Computer Science & Information Technology

You might also like to view...

In a business letter, the signature block consists of two to four lines below the complimentary closing, and is followed by the sender's typed name

Indicate whether the statement is true or false

Computer Science & Information Technology

When you create a chart in Word, a(n) ________ is displayed

Fill in the blank(s) with correct word

Computer Science & Information Technology